Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 7367518, 13 pages
https://doi.org/10.1155/2017/7367518
Research Article

Two-Phase Image Encryption Scheme Based on FFCT and Fractals

Department of Engineering Mathematics, Faculty of Engineering, Alexandria 21544, Egypt

Correspondence should be addressed to Mervat Mikhail; moc.liamg@08liahkim.tavrem

Received 19 July 2016; Revised 21 October 2016; Accepted 20 November 2016; Published 22 January 2017

Academic Editor: Anna Cinzia Squicciarini

Copyright © 2017 Mervat Mikhail et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. Li, Cryptanalyses of some multimedia encryption schemes [M.S. dissertation], Zhejiang University, Hangzhou, China, 2005.
  2. W. Stallings, Cryptography and Network Security: Principlesand Practices, Pearson Education India, 2006.
  3. N. Rawal and M. Dhawan, “A survey report on imageencryption techniques,” International Journal of Engineering Research and Technology, vol. 2, no. 10, 2013. View at Google Scholar
  4. A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Booz-Allen and Hamilton Inc, Mclean, Va, USA, 2001.
  5. J. B. Lima and R. M. C. de Souza, “Histogram uniformization for digital image encryption,” in Proceedings of the 25th Conference on Graphics, Patterns and Images (SIBGRAPI '12), pp. 55–62, IEEE, Ouro Preto, Brazil, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. S. K. Abd-El-Hafiz, A. G. Radwan, S. H. Abdel Haleem, and M. L. Barakat, “A fractal-based image encryption system,” IET Image Processing, vol. 8, no. 12, pp. 742–752, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. K. D. Patel and S. Belani, “Image encryption using differenttechniques: a review,” International Journal of Emerging Technology and Advanced Engineering, vol. 1, no. 1, pp. 30–34, 2011. View at Google Scholar
  8. P. S. Addison, Fractals and Chaos: An Illustrated Course, CRC Press, 1997. View at Publisher · View at Google Scholar · View at MathSciNet
  9. H. Liu and X. Wang, “Color image encryption based on one-time keys and robust chaotic maps,” Computers & Mathematics with Applications, vol. 59, no. 10, pp. 3320–3327, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. M. Amin, O. S. Faragallah, and A. A. Abd El-Latif, “A chaotic block cipher algorithm for image cryptosystems,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 11, pp. 3484–3497, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  11. X.-Y. Wang, F. Chen, and T. Wang, “A new compound mode of confusion and diffusion for block encryption of image based on chaos,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2479–2485, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. X. Wang, X. Wang, J. Zhao, and Z. Zhang, “Chaotic encryption algorithm based on alternant of stream cipher and block cipher,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 63, no. 4, pp. 587–597, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. X. Huang, “Image encryption algorithm using chaotic Chebyshev generator,” Nonlinear Dynamics, vol. 67, no. 4, pp. 2411–2417, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. X. Wang and D. Luan, “A novel image encryption algorithm using chaos and reversible cellular automata,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 11, pp. 3075–3085, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. A. J. J. Lock, C. H. Loh, S. H. Juhari, and A. Samsudin, “Compression-encryption based on fractal geometric,” in Proceedings of the 2nd International Conference on Computer Research and Development (ICCRD'10), pp. 213–217, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. Y.-Y. Sun, R.-Q. Kong, X.-Y. Wang, and L.-C. Bi, “An image encryption algorithm utilizing Mandelbrot set,” in Proceedings of the 3rd International Workshop on Chaos-Fractal Theories and Applications (IWCFTA '10), pp. 170–173, IEEE, Yunnan, China, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. J. B. Lima, E. A. O. Lima, and F. Madeiro, “Image encryption based on the finite field cosine transform,” Signal Processing: Image Communication, vol. 28, no. 10, pp. 1537–1547, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Rakesh, A. A. Kaller, B. C. Shadakshari, and B. Annappa, “Multilevel image encryption,” https://arxiv.org/abs/1202.4871.
  19. M. M. de Souza, H. M. de Oliveira, R. M. de Souza, and M. M. Vasconcelos, “The discrete cosine transform over prime finite fields,” in Telecommunications and Networking—ICT 2004: 11th International Conference on Telecommunications, Fortaleza, Brazil, August 1–6, 2004. Proceedings, vol. 3124 of Lecture Notes in Computer Science, pp. 482–487, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  20. J. B. Lima, E. S. da Silva, and R. M. de Souza, “A finite field cosine transform-based image processing scheme for color image encryption,” in Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP '15), pp. 1071–1075, Orlando, Fla, USA, December 2015. View at Publisher · View at Google Scholar
  21. B. Rama and J. Mishra, “Game-enabling the 3D-Mandelbulb fractal by adding velocity-induced support vectors,” International Journal of Computer Applications, vol. 48, no. 1, pp. 1–3, 2012. View at Publisher · View at Google Scholar
  22. Y. Wu, J. P. Noonan, and S. Agaian, “NPCR and UACIrandomness tests for image encryption,” Journal of Selected Areas in Telecommunications (JSAT), pp. 31–38, 2011. View at Google Scholar
  23. J. B. Lima, “Fast algorithm for computing cosine number transform,” Electronics Letters, vol. 51, no. 20, pp. 1570–1572, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. The USC-SIPI Image Database, “University of Southern California, signal and image processing institute,” http://sipi.usc.edu/database/.